Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p7xj-cwwg-rg5h

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services.

Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services.

EPSS

Процентиль: 48%
0.00245
Низкий

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 8.3
nvd
почти 5 лет назад

Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services.

EPSS

Процентиль: 48%
0.00245
Низкий

Дефекты

CWE-918